Tuesday, June 26, 2007

Canadian professional wrestler Chris Benoit, who performed for World Wrestling Entertainment (WWE), was found dead, along with his wife Nancy, 43, and their son Daniel, 7, in their home in Atlanta, Georgia on Monday. Police are calling the deaths a “double murder-suicide.”

“There are no further details at this time, other than the Benoit family residence is currently being investigated by local authorities. WWE extends its sincerest thoughts and prayers to the Benoit family’s relatives and loved ones in this time of tragedy,” said a statement posted on the WWE website.

Scott Ballard, Fayette County District Attorney, says that “the details (of the incident), when they come out, are going to prove a little bizarre.”

Fayette County Sheriff deputy Lt. Tommy Pope stated that police found the family at about 2:30 p.m. (eastern time) when the WWE called police and asked them to do a “welfare check” after friends stated that Benoit sent them “curious text messages.” It is reported that Benoit missed several meetings which prompted the call to police. Pope also stated that police were “not actively searching for any suspects outside of the house.”

In a press conference, the Sheriff’s Office released the details that Benoit’s wife and son had both died of asphyxiation. He also hinted that the wife had been bound. TMZ.com is reporting that Benoit strangled his wife on Friday, smothered his son on late Friday or early Saturday, and then hanged himself inside his weight room on late Saturday, Sunday, or Monday.

Benoit was scheduled to wrestle in Houston, Texas for a match at WWE’s Vengeance pay-per-view event on June 24. However, Benoit flew home due to “personal reasons,” said Jim Ross, the announcer for WWE events.

Benoit was a professional wrestler with the nickname The Canadian Crippler, who wrestled for New Japan Pro Wrestling, Extreme Championship Wrestling, World Championship Wrestling, and World Wrestling Entertainment. His wife Nancy was known in the wrestling ring as Woman and Fallen Angel. She was a valet and manager and also wrestled for Jim Crockett Promotions, Extreme Championship Wrestling and World Championship Wrestling.

Retrieved from “https://en.wikinews.org/w/index.php?title=Professional_wrestler_Chris_Benoit_and_family_found_dead&oldid=4598217”

Monday, June 23, 2008

2008 COMPUTEX Taipei, the largest trade fair since its inception in 1982, featured several seminars and forums, expansions on show spaces to TWTC Nangang, great transformations for theme pavilions, and WiMAX Taipei Expo, mainly promoted by Taipei Computer Association (TCA). Besides of ICT industry, “design” progressively became the critical factor for the future of the other industries. To promote innovative “Made In Taiwan” products, pavilions from “Best Choice of COMPUTEX”, “Taiwan Excellence Awards”, and newly-set “Design and Innovation (d & i) Award of COMPUTEX”, demonstrated the power of Taiwan’s designs in 2008 COMPUTEX Taipei.

Retrieved from “https://en.wikinews.org/w/index.php?title=2008_COMPUTEX_Taipei:_Three_awards,_One_target&oldid=1108560”

By Richard Armen

In today’s world, the danger that a stalker presents is serious business. Although there are various steps that you can take to help limit the possibility that you may acquire a stalker, it is sometimes inevitable. There are a number of tell-tale signs that you may have a stalker. If you think someone may be stalking or following you, can consult the authorities and take action to limit the amount of danger presented by your stalker.

1) Understand the potential for stalking. Stalking is a type of intimidation and harassment that usually stems from a stalker not understanding the nature of a relationship. For example, if you’ve recently turned someone down for a date and they don’t seem to fully grasp the situation, you may be in danger. Stalking does not just include following you; often, these actions progress into much more, which is why it is so important to put an end to such behaviors quickly.

2) A potential stalker may appear at locations unannounced. These locations may include your place of work, your home, and places you stop by routinely. The appearance of such an individual may be benign. At first, you may think they’re simply running into you because they frequent the same locations. In this case, simply telling them that you do not want their presence provides a simple solution. However, if an individual still shows up unannounced it is likely that they are a stalker.

[youtube]http://www.youtube.com/watch?v=tCK03Po10iE[/youtube]

3) Unwanted gifts may show up unexpectedly. The gifts may be intimate in nature, since, for the most part, stalkers seem to feel that they have a stronger connection to their victims then is actually true. Lingerie, flowers, jewelry, photographs, and letters, among other things, may appear at your home or business.

4) Harassing phone calls, emails or text messages may also be an indication of a potential stalker. These messages may vary in nature, but a common thread is that these messages will be frequent and intimate. Occasionally stalkers will proclaim their love for an individual, but they may also proclaim their dislike for someone.

5) Your stalker may also know various things about you that they would not necessarily know from a casual or everyday conversation. If a potential stalker seems to know personal information about you, it may be a result of their delusion that they are closer to you then they actually are. Some stalkers will go to great lengths to learn all they can about their target.

6) A stalker may also threaten your friends and family. Since some stalkers may be suffering from delusions of intimacy and a general disconnect with reality, they may be mentally unstable. Even as your stalker professes his or her love for you, they may also be threatening those closest to you.

Even stalkers who start out friendly and seem harmless may turn violent and angry for no apparent reason. If you do suspect that you are being stalked, change your routine, alert friends and families so that they can help to provide a buffer zone, and consult with the authorities.

About the Author: Resist Attack has a full range of TASER devices to keep you and your family safe. Also check for current specials on expandable batons

Source: isnare.com

Permanent Link: isnare.com/?aid=669004&ca=Advice

This is the category for science and technology.

Refresh this list to see the latest articles.

  • 21 April 2021: Wikinews discusses DRM and DMCA with Richard Stallman after GitHub re-enables public access to youtube-dl
  • 7 April 2021: NASA’s helicopter Ingenuity survives its first night at Mars
  • 25 December 2020: ‘Earth-based life can survive in hydrogen-rich atmospheres’: MIT professor Dr Seager tells Wikinews about her research on organisms thriving in oxygen-less environment
  • 18 December 2020: Gregory Kurtzer discusses plans for Rocky Linux with Wikinews as Red Hat announces moving focus away from CentOS
  • 14 December 2020: Red Hat to move focus away from CentOS in favour of Stream; CentOS team discuss implications with Wikinews
  • 26 October 2020: GitHub blocks public access to youtube-dl after RIAA issues DMCA notice
  • 31 July 2020: “Avast ye scurvy file sharers!”: Interview with Swedish Pirate Party leader Rickard Falkvinge
  • 7 July 2020: Astronomer Anthony Boccaletti discusses observation of birth of potential exoplanet with Wikinews
  • 30 June 2020: Open source game developer Perttu Ahola talks about Minetest with Wikinews
  • 28 June 2020: Neanderthals ‘knew what they were doing’: Archæologist Dr Naomi Martisius discusses her findings about Neanderthals’ behaviour with Wikinews
?Category:Science and technology

You can also browse through all articles in this category alphabetically.

From Wikinews, the free news source you can write.



Sister projects
  • Wikibooks
  • Commons
  • Wikidata
  • Wikipedia
  • Wikiquote
  • Wikisource
  • Wikiversity

Subcategories

Pages in category “Science and technology”

(previous page) ()(previous page) ()

Media in category “Science and technology”

Retrieved from “https://en.wikinews.org/w/index.php?title=Category:Science_and_technology&oldid=4551729”

Monday, February 25, 2008American art director and production designer Robert F. Boyle was honoured last night at the Academy Awards.

Hired as an extra in films during the Great Depression, the young architect became a draftsman at Paramount Studios, moving on to become a sketch artist and assistant art director, before becoming a full-fledged art director in the early 1940s, at Universal Studios.

His credits include Alfred Hitchcock films Saboteur (1942), North by Northwest (1959), and The Birds (1963). Other films to his credit include The Thomas Crown Affair (1968), Gaily, Gaily (1969), Fiddler on the Roof (1971), and The Shootist (1976).

The Oscar-nominated documentary short The Man on Lincoln’s Nose (2000) chronicles his career, which includes the 1997 Art Directors Guild’s Lifetime Achievement Award and four Oscar nominations.

Retrieved from “https://en.wikinews.org/w/index.php?title=Robert_Boyle_wins_Honorary_Oscar_for_his_art_direction_career&oldid=888312”

byAlma Abell

Over the last few years, Dentist Implants in Verona have become a very popular cosmetic dental procedure. In fact, some dentists are doing just as many dental implants as they are dental veneers and teeth whitening procedures. Plus, the popularity of dental implants is expected to grow even more rapidly over the next ten years. If you’ve been thinking about getting dental implants as a replacement for missing teeth, be aware it may not be the best option for you. Before you speak with your dentist about dental implants, take a look at some of the advantages and disadvantages of this procedure.

[youtube]http://www.youtube.com/watch?v=lmDYAGzTZOk[/youtube]

One advantage of getting dental implants is they don’t ever have to be removed. Unlike dentures that have to be removed to be cleaned, you can clean dental implants the same way you would your natural teeth. Keep in mind that if you have dental implants, it’s a good idea to visit your dentist to have routine cleanings and examinations, too. Another advantage of getting dental implants is that they are comfortable. In fact, most people say they feel like natural teeth and you can eat any of the foods you would if they were your natural teeth.

Of course, there are several great advantages of getting Dentist Implants in Verona, but there are disadvantages too. Perhaps, the biggest disadvantage is the cost. If you have a dental implant procedure for a single tooth, it can cost anywhere from one thousand to six thousand dollars. Plus, since dental implants are considered a cosmetic procedure, most insurance companies will not cover the cost of implants. If you are someone who has health problems, it may also be best to avoid getting dental implants. Most dentists don’t advise people who have heart problems or have suffered from strokes to get them.

As you can see, there are both advantages and disadvantages to having dental implants. If you think they sound like a good option for you, be sure to Visit the website of Philip E Toaldo DDS PA to schedule a consultation. During your visit, the dentist will discuss your medical history and decide if you are an ideal candidate for dental implants. If you meet with him and decide dental implants aren’t the best option for you, he will advise you of procedures that may be right for you instead.

Submitted by: Dennisng Ng

Question: 1

Which three statements are true about the operation of a full-duplex Ethernet network? (Choose three.)

A. There are no collisions in full-duplex mode.

B. A dedicated switch port is required for each full-duplex node.

C. Ethernet hub ports are preconfigured for full-duplex mode.

D. In a full-duplex environment, the host network card must check for the availability of the network media before transmitting.

E. The host network card and the switch port must be capable of operating in full-duplex mode.

Answer: A, B, E

Explanation:

Half-duplex Ethernet is defined in the original 802.3 Ethernet and Cisco says you only use one wire pair with a digital signal running in both directions on the wire. It also uses the CSMA/CD protocol to help prevent collisions and to permit retransmitting if a collision does occur. If a hub is attached to a switch, it must operate in half-duplex mode because the end stations must be able to detect collisions. Half-duplex Ethernettypically 10BaseTis only about 30 to 40 percent efficient as Cisco sees it, because a large 10BaseT network will usually only give you 3- to 4Mbpsat most.

Full-duplex Ethernet uses two pairs of wires, instead of one wire pair like half duplex. Also, full duplex uses a point-to-point connection between the transmitter of the transmitting device and the receiver of the receiving device, which means that with full-duplex data transfer, you get a faster data transfer compared to half duplex. And because the transmitted data is sent on a different set of wires than the received data, no collisions occur. The reason you dont need to worry about collisions is because now Full-duplex Ethernet is like a freeway with multiple lanes instead of the single-lane road provided by half duplex. Full-duplex Ethernet is supposed to offer 100 percent efficiency in both directions; this means you can get 20Mbps with a 10Mbps Ethernet running full duplex, or 200Mbps for FastEthernet.

Question: 2

DRAG DROP

On the left are various network protocols. On the right are the layers of the TCP/IP model. Assuming a reliable connection is required, move the protocols on the left to the TCP/IP layers on the right to show the proper encapsulation for an email message sent by a host on a LAN. (Not all options are used.)

Answer:

Question: 3

Which OSI layer header contains the address of a destination host that is on another network?

A. application

B. session

C. transport

D. network

E. data link

F. physical

Answer: D

Explanation:

Only network address contains this information. To transmit the packets the sender uses network address and datalink address. But the layer 2 address represents just the address of the next hop device on the way to the sender. It is changed on each hop. Network address remains the same.

Question: 4

Which layer of the TCP/IP stack combines the OSI model physical and data link layers?

A. Internet laye

B. transport laye

C. application laye

D. network access laye

Answer: D

Explanation:

The Internet Protocol Suite, TCP/IP, is a suite of protocols used for communication over the internet. The TCP/ IP model was created after the OSI 7 layer model for two major reasons. First, the foundation of the Internet was built using the TCP/IP suite and through the spread of the World Wide Web and Internet, TCP/IP has been preferred. Second, a project researched by the Department of Defense (DOD) consisted of creating the TCP/IP protocols. The DOD’s goal was to bring international standards which could not be met by the OSI model.

Since the DOD was the largest software consumer and they preferred the TCP/IP suite, most vendors used this model rather than the OSI. Below is a side by side comparison of the TCP/IP and OSI models.

Question: 5

Which protocol uses a connection-oriented service to deliver files between end systems?

A. TFTP

B. DNS

C. FTP

D. SNMP

E. RIP

Answer: C

Explanation:

TCP is an example of a connection-oriented protocol. It requires a logical connection to be established between the two processes before data is exchanged. The connection must be maintained during the entire time that communication is taking place, then released afterwards. The process is much like a telephone call, where a virtual circuit is established–the caller must know the person’s telephone number and the phone must be answered–before the message can be delivered.

TCP/IP is also a connection-oriented transport with orderly release. With orderly release, any data remaining in the buffer is sent before the connection is terminated. The release is accomplished in a three-way handshake between client and server processes. The connection-oriented protocols in the OSI protocol suite, on the other hand, do not support orderly release. Applications perform any handshake necessary for ensuring orderly release.

Examples of services that use connection-oriented transport services are telnet, rlogin, and ftp.

Question: 6

Refer to the exhibit.

If the hubs in the graphic were replaced by switches, what would be virtually eliminated?

A. broadcast domains

B. repeater domains

C. Ethernet collisions

D. signal amplification

E. Ethernet broadcasts

Answer: C

Explanation:

Modern wired networks use a network switch to eliminate collisions. By connecting each device directly to a port on the switch, either each port on a switch becomes its own collision domain (in the case of half duplex links) or the possibility of collisions is eliminated entirely in the case of full duplex links.

Question: 7

Refer to the exhibit.

If host A sends an IP packet to host B, what will the source physical address be in the frame when it reaches host B?

A. 10.168.10.99

B. 10.168.11.88

C. A1:A1:A1:A1:A1:A1

D. B2:B2:B2:B2:B2:B2

E. C3:C3:C3:C3:C3:C3

F. D4:D4:D4:D4:D4:D4

Answer: E

Explanation:

When packets transfer from one host to another across a routed segment, the source IP address always remains the same source IP address, and the source physical (MAC) address will be the existing routers interface address. Similarly, the destination IP address always remains the same and the destination physical (MAC) address is the destination routers interface address.

Question: 8

Refer to the exhibit.

HostX is transferring a file to the FTP server. Point A represents the frame as it goes toward the Toronto router. What will the Layer 2 destination address be at this point?

A. abcd.1123.0045

B. 192.168.7.17

C. aabb.5555.2222

D. 192.168.1.1

E. abcd.2246.0035

Answer: E

Explanation:

For packets destined to a host on another IP network, the destination MAC address will be the LAN interface of the router. Since the FTP server lies on a different network, the host will know to send the frame to its default gateway, which is Toronto.

Question: 9

Which network device functions only at Layer 1 of the OSI model?

A. Option A

B. Option B

C. Option C

D. Option D

E. Option E

Answer: B

Explanation:

Most hubs are amplifying the electrical signal; therefore, they are really repeaters with several ports. Hubs and repeaters are Layer 1 (physical layer) devices.

Question: 10

Refer to the exhibit.

The host in Kiev sends a request for an HTML document to the server in Minsk. What will be the source IP address of the packet as it leaves the Kiev router?

A. 10.1.0.1

B. 10.1.0.5

C. 10.1.0.6

D. 10.1.0.14

E. 10.1.1.16

F. 10.1.2.8

Answer: E

Although the source and destination MAC address will change as a packet traverses a network, the source and destination IP address will not unless network address translation (NAT) is being done, which is not the case here.

Question: 11

Refer to the exhibit.

As packets travel from Mary to Robert, which three devices will use the destination MAC address of the packet to determine a forwarding path? (Choose three.)

A. Hub1

B. Switch1

C. Router1

D. Switch2

E. Router2

F. Switch3

Answer: B, D, F

Explanation:

Switches use the destination MAC address information for forwarding traffic, while routers use the destination IP address information.

Local Area Networks employ Layer 2 Switches and Bridges to forward and filter network traffic. Switches and Bridges operate at the Data Link Layer of the Open System Interconnect Model (OSI). Since Switches and Bridges operate at the Layer 2 they operate more intelligently than hubs, which work at Layer 1 (Physical Layer) of the OSI. Because the switches and bridges are able to listen to the traffic on the wire to examine the source and destination MAC address. Being able to listen to the traffic also allows the switches and bridges to compile a MAC address table to better filter and forward network traffic.

To accomplish the above functions switches and bridges carry out the following tasks:

MAC address learning by a switch or a bridge is accomplished by the same method. The switch or bridge listens to each device connected to each of its ports and scan the incoming frame for the source MAC address. This creates a MAC address to port map that is cataloged in the switches/bridge MAC database. Another name for the MAC address table is content addressable memory or CAM table.

When a switch or bridge is listening to the network traffic, it receives each frame and compares it to the MAC address table. By checking the MAC table the switch/ bridge are able o determine which port the frame came in on. If the frame is on the MAC table the frame is filtered or transmitted on only that port. If the switch determines that the frame is not on the MAC table, the frame is forwarded out to all ports except the incoming port.

Question: 12

Refer to the exhibit.

Mary is sending an instant message to Robert. The message will be broken into a series of packets that will traverse all network devices. What addresses will populate these packets as they are forwarded from Router1 to Router2?

A. Option A

B. Option B

C. Option C

D. Option D

E. Option E

Answer: B

Explanation:

The Source and Destination IP address is not going to change. Host 1 IP address will stay as being the source IP and the Host 2 IP address will stay the destination IP address. Those two are not going to change.

For the MAC address it is going to change each time it goes from one hope to another. (Except switches… they don’t change anything)

Frame leaving HOST 1 is going to have a source MAC of Host 1 and a destination MAC of Router 1.

Router 1 is going to strip that info off and then will make the source MAC address of Router1’s exiting interface, and making Router2’s interface as the destination MAC address.

Then the same will happen… Router2 is going to change the source/destination info to the source MAC being the Router2 interface that it is going out, and the destination will be Host2’s MAC address.

Question: 13

Refer to the exhibit.

A network device needs to be installed in the place of the icon labeled Network Device to accommodate a leased line attachment to the Internet. Which network device and interface configuration meets the minimum requirements for this installation?

A. a router with two Ethernet interfaces

B. a switch with two Ethernet interfaces

C. a router with one Ethernet and one serial interface

D. a switch with one Ethernet and one serial interface

E. a router with one Ethernet and one modem interface

Answer: C

Explanation:

Only a router can terminate a leased line attachment access circuit, and only a router can connect two different IP networks. Here, we will need a router with two interfaces, one serial connection for the line attachment and one Ethernet interface to connect to the switch on the LAN.

Question: 14

Which transport layer protocol provides best-effort delivery service with no acknowledgment receipt required?

A. HTTP

B. IP

C. TCP

D. Telnet

E. UDP

Answer: E

Explanation:

UDP provides a connectionless datagram service that offers best-effort delivery, which means that UDP does not guarantee delivery or verify sequencing for any datagrams. A source host that needs reliable communication must use either TCP or a program that provides its own sequencing and acknowledgment services.

Question: 15

Which layer of the OSI model controls the reliability of communications between network devices using flow control, sequencing and acknowledgments?

A. Physical

B. Data-link

C. Transport

D. Network

Answer: C

Explanation:

About the Author: Test Information:Total Questions: 309Test Number: 100-105Vendor Name: CISCOCert Name: CCNATest Name: Interconnecting Cisco Networking Devices Part 1 (ICND1) v3Official Site:

examcertify.co.uk

For More Details:

examcertify.co.uk/100-105.html

Get20% Immediate Discount on Full Training MaterialDiscount Coupon Code:79741B6012

Source:

isnare.com

Permanent Link:

isnare.com/?aid=1965409&ca=Computers+and+Technology}

Sunday, January 21, 2007

Fire broke out in the Ku-ring-gai Chase National Park, on the outskirts of Sydney, Australia, at approximately 5pm on Sunday 21st January 2007. The site of the fire is inaccessible terrain in the Bobbin Head/Apple Tree Bay area.

For a time properties were threatened in Mount Ku-ring-gai, but this danger has now passed. The F3 freeway and northern train line were closed, causing freeway traffic to be banked up. The morning saw delayed traffic on the F3, which was briefly opened, but for the most part traffic was diverted onto the Pacific Highway at the Berowra Exit.

Around midday the F3 Freeway and Pacific Highway were closed until further notice, severing Sydney’s northern vehicular links. During Monday afternoon the railway line was closed. Traffic for the north was being routed inland via Wisemans Ferry Road, though Windsor. The Pacific Highway, F3 and railway line reopened at 6pm. Welfare centres have been opened for commuters who cannot get home. They are located at Berowra Community Centre (north of the fire) and Thornleigh Baptist Community Centre (south of the fire).

Overnight backburning along with a direct attack has seen the main threat dissipate with the southern fire front under control. On Monday morning spot fires continue to move north towards Cowan Creek. The wind has been picking up in the local area during Monday afternoon. The fire is proving difficult to contain due to spot fires and flying embers.

There has continuous helicopter activity over the area during Monday.

The NSW Rural Fire Service will be holding Community briefings at the Berowra Oval and Samuel King Park Bobbin Head Road Turramurra at 5.30pm today (Monday).

Tuesday saw continuing helicopter activity. Steady rain has been falling throughout Tuesday night and Wednesday morning. The Rural fire service has stated that it is now confident that the fire will be contained.

Retrieved from “https://en.wikinews.org/w/index.php?title=Fire_breaks_out_in_Ku-ring-gai_Chase_National_Park,_Australia&oldid=784300”